[unisog] New (No kidding) RPC Vulnerability

Edward W. Ray support at mmicman.com
Thu Sep 11 04:59:56 GMT 2003


How about getting rid of the "SYSTEM" user?  The kernel model for Windows is
horribly flawed; they will NEVER be able to secure their OS until ALL
services or applications can be run with non-administrator privileges.

My $0.02

Edward W. Ray
SANS GCIA, GCIH 

-----Original Message-----
From: Gary Flynn [mailto:flynngn at jmu.edu] 
Sent: Wednesday, September 10, 2003 1:58 PM
Cc: unisog at sans.org
Subject: Re: [unisog] New (No kidding) RPC Vulnerability



Dax wrote:

> 	Sadly, I can't even come up with something quick and witty to say, 
> thanks to my slack-jawed state of disbelief...
> 
> http://www.microsoft.com/technet/security/bulletin/MS03-039.asp
> http://www.microsoft.com/security/security_bulletins/MS03-039.asp
> 	
> 	Sooo...good job patching for Blaster everyone...Next!

And just to avoid confusion, it IS a new defect:
http://www.eeye.com/html/Research/Advisories/AD20030910.html

The patch fixes both the old and new defects. Doesn't look as easy to
exploit but there is a lot of attention being paid to it. :(

--
Gary Flynn
Security Engineer - Technical Services
James Madison University

Please R.U.N.S.A.F.E.
http://www.jmu.edu/computing/runsafe



More information about the unisog mailing list